philwantsfish / gdb_commandsView external linksLinks
GDB commands to aid exploit development
☆46Sep 9, 2016Updated 9 years ago
Alternatives and similar repositories for gdb_commands
Users that are interested in gdb_commands are comparing it to the libraries listed below
Sorting:
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- ☆17Aug 4, 2014Updated 11 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- A Golang covert backdoor using raw sockets.☆35Feb 10, 2019Updated 7 years ago
- xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo☆72Mar 20, 2015Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- ☆19Jun 22, 2015Updated 10 years ago
- x64 Windows Software Fault Injection Tool☆17Dec 2, 2017Updated 8 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 5 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆94Dec 23, 2025Updated last month
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 9 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- ☆22Nov 18, 2015Updated 10 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago